bodiaga
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-28_bc69fe693d7847a09ad69fef17f7827a_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-28_bc69fe693d7847a09ad69fef17f7827a_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-28_bc69fe693d7847a09ad69fef17f7827a_mafia
-
Size
11.2MB
-
MD5
bc69fe693d7847a09ad69fef17f7827a
-
SHA1
e769da6a06c64a656686f9ca39b01cdea4decc60
-
SHA256
ee06a44cd6bc5c852ef5e3e26ce0a11fef7502cdca6b1ac98dfe012770d22e11
-
SHA512
ab887575c2c99f1ee19e7d7cfd6ee9d13ab9930191e3b4fc0f69dae07c11b386462e7ec09e53f02802b305e14c60b03bdaecc141687e88065483a18d824cdf5d
-
SSDEEP
6144:0LQ1p/2p5e+D2jFHO+iZoy6u9FlfrXEz9NQNQNQNQNQNQNQNQNQNQNQNQNQNQNQJ:pTYe+D2jFu+iZoUFhAzG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-01-28_bc69fe693d7847a09ad69fef17f7827a_mafia
Files
-
2025-01-28_bc69fe693d7847a09ad69fef17f7827a_mafia.exe windows:5 windows x86 arch:x86
81681f8787b6f6eda1666b6ebe54450c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeExW
GetExitCodeProcess
Beep
GetFileAttributesW
GetAtomNameW
CreateFileW
lstrlenW
FindNextVolumeMountPointW
IsBadStringPtrA
LCMapStringA
GetLargestConsoleWindowSize
EnumSystemLocalesA
LoadLibraryW
HeapUnlock
VirtualProtectEx
BuildCommDCBW
GetProcessVersion
GetTapeParameters
DebugSetProcessKillOnExit
SetConsoleTitleW
GetProcessShutdownParameters
LoadLibraryExA
OpenFileMappingW
LocalSize
GetPrivateProfileSectionW
SetFileShortNameW
GlobalAlloc
GetCurrencyFormatW
GetDriveTypeA
SetCommTimeouts
GetCommandLineA
FormatMessageA
EnumCalendarInfoExW
GetTickCount
SetTapeParameters
BackupSeek
CreateHardLinkA
GetUserDefaultLCID
GlobalLock
GetNamedPipeHandleStateA
WriteTapemark
MapViewOfFile
FindFirstFileW
GlobalDeleteAtom
GetProcAddress
FileTimeToDosDateTime
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
FatalAppExitA
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
CloseHandle
WriteConsoleW
SetFilePointer
SetStdHandle
advapi32
CloseEventLog
GetServiceDisplayNameA
GetLengthSid
GetSecurityDescriptorSacl
RegLoadKeyA
AllocateAndInitializeSid
RegDeleteValueW
LookupPrivilegeValueA
DeregisterEventSource
EqualSid
RegSetValueExA
RegRestoreKeyA
AddAccessAllowedAceEx
SetServiceObjectSecurity
AccessCheckAndAuditAlarmW
IsValidAcl
LookupPrivilegeNameW
OpenServiceA
GetCurrentHwProfileA
GetSecurityDescriptorDacl
Exports
Exports
Sections
.text Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 497KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yohol Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pav Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.9MB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ